Tag Archives: message

How to Improve Internet speed at your Business

How to Improve Internet speed at your Business

If you are a Business owner or a System Administrator and the Internet connection is an important piece of your business, you probably know how difficult it is sometimes to keep a good balance between the real needs and the perfect Internet Connection.

Most of the times the first impulse is to make a connection upgrade and many times, this is the right step. Sometimes however we can improve a lot the Internet usage without upgrading. This article will show you what to do to improve the Internet speed without upgrading.

What is the Root Cause of your Slow Internet

Determine if the problem is the Internet Connection Bandwidth.
Many times the problem is the computer or the Local Area network. If your network was installed by your cousin or a friend who “New How to Do IT” it is likely that this is your problem. Check this article to learn “How to Troubleshoot a Slow Network.”(coming soon)
Use an Internet Connection Speed Test and determine if the connection performs at parameters.

Implement policies for the Internet use.

Very often companies don’t have a policy for Internet usage and employees abuse it and use it for personal use.
Educate employees about the day to day operations.
Many people don’t know what is acceptable to do and not to do on Internet. For Instance listening radio over Internet is a total waste if you don’t have huge bandwidth. Internet phones take a lot of bandwidth use whenever possible a regular phone. Video streaming are big bandwidth consumers. Users sometimes download files two or three times just because they don’t know where that file goes after the download. Many times they don’t even have the right to install or the file is already saved on an internal server. Sending files as attachments is another common mistake, especially if your mail server is hosted outside the company. Users will always prefer to send files via email than via a file server. A 15 Mb file will generate an Outlook message of around 18Mb. This 18 Mb will be uploaded to the email server which is the more painful operation on an asynchronous DSL connection (download is 3M but upload is 800K), and then will be again downloaded. If this email is sent to a few people imagine the connection bottleneck created.

Using a Caching Proxy could save you Money

If after all of the previous steps your business is still too slow you can implement a Caching Proxy. A Caching Proxy Server is an extremely useful tool to optimize Internet connection utilization and security. A Caching Proxy Server will cache the most used data and then serve it to its next client from the local copy rather than the Internet. A proxy will increase security in the company by providing an additional layer between the client and the Internet. It will help you enforce policies and control Internet Usage. It is also a great tool to log the Internet activity of your users. The downside of a proxy server is that is not easy to administrate, it needs an IT professional.

Caching Proxy Software

Two of the most used Caching Proxies are Squid and Microsoft ISA Server. Both of them are great tools extremely customizable and flexible. ISA Server is a rather expensive product but it has the advantage of a visual administration interface. On the other hand Squid is free software, but it needs command line administration. Another major advantage of Squid is that it doesn’t need too much hardware resources, and if configured properly can deliver excellent services.

A good companion for squid is a Content Filter. A content filter is a program that filters the access to Internet based on rules specified by the Administrator, public lists of known offensive websites and heuristic analysis. Two good content filtering programs are DansGuardian and SquidGuard.

Your Internet Usage Policies have to be Relaxed

As a closing paragraph I would recommend to keep a balance between business and personal use depending of the nature of your business. My experience showed that an extreme restriction would deteriorate the work climate and make your employee unhappy. On the other hand security and control of Internet Access are a very important factor and employees should understand this.

Chain Letters and Spam Email

Email Chain letters are one of the sneakiest and devious ways of SPAM. I consider them a particular case of social engineering.

Chain Letters Target Human Weakness and the Lack of Information.

Even though chain letters come always from your friends, and they look like their purpose is to spread “peace on Earth” or to give you an insightful perspective of life, or ask you to help someone in need, their purpose is Spamming.
You can recognize this by the encouragement to forward the message to your friends or to close the email circle or anything similar. Some of you came here as a result of my SPAM, (I apologize, I had to…).
Sometimes the spammer will go as far as threatening you to send to your friends or else something bad will happen. All of these are various sorts of psychological exploitation. They target human weakness and lack of knowledge.
Most of the times chain letters contain false, misleading, frightening, or foolish messages, Urban Legends, Virus Hoaxes. The Chain Letter has evolved now and it is more subtle nonetheless dangerous. It uses “good luck” promises, “missionary” messages, or even true philosophical dissertations.
No matter what is the method of persuasion, all the chain letters will convince you to send the letter to other people. It is very convincing and it targets human flaws. I am not an easy to scare person but I can remember myself in at least on occasion getting chills up my spine while reading the blackmail at the end of the email. Human brain is easily influenced, once the message read you will start, unconsciously, to act upon validating the prediction. It is a process similar to Hypnosis.
Best way to avoid such events is to delete the message without reading it.
There is also the positive message if you forward the message to 5 friends something wonderful will happen in your life. Who can resist such a promise? Me.

Is It Wrong to Propagate Chain Letters?

Short answer – YES – it’s wrong to propagate chain letters. Previous paragraph explains why.
Long answer:
Sometimes it is hard to ignore some of these messages and discard them. Their message is beautiful, and you would like to share it with your friends. There is not too wrong to do that IF and ONLY IF you follow these simple rules.
Use BCC field when addressing your email, (blind carbon copy). This will conceal the destination addresses.
When the chain letter arrives in your Inbox there are high chances to contain all the previous recipients into its body. Remove all the email addresses in the body, before forwarding the message. This is of no benefit to you, but it will benefit the community, and if many people do this harvesting addresses will be very difficult. Who knows on how many chain letters has circulated my email address?
If you really need to send chain letters, consider using your secondary email address.
Consistency on doing all of these will discourage the creators of such letters to write them, as the benefit from sending them will be null.

The image below shows a portion of the email body of a message that contains all the previous recipients of a chain letter. Using an email harvesting utility I got 417 email addresses only from this message.

Example of email Chain Letter
Chain Letter - Click to enlarge

What does the SPAMMER achieve by these kinds of emails?

They harvest email addresses. How do they do this? The principle is that the more an email circulate the more chances are to come back to the original sender. Even if it doesn’t come back it will go to another SPAMMER in the “Black Hat Web Marketing Community” and made public within the community. Then all the harvested email address will be shared or sold.
Another reason for circulating chain letters is scamming people. There are numerous scamming schemes circulating through emails.
There are also the hoaxes. A lot of chain letters warn about an upcoming virus or a computer threat. Most of them are hoaxes. Some of them are just simple hoax, but some other are cleverly crafted emails, so that when a recipient look for some of the keywords in the respective email, they would be directed by the search engine to targeted websites.

How can the Spammer harvest email addresses?

The main problem comes from the fact that most of the people will never think of hiding email addresses when they are forwarding messages. This makes that an email can sometimes contain hundreds or even thousands of addresses from all the people that forwarded it. The picture bellow depicts such a message.

What can you do to help?

First, whenever you send an email to a list of people add your addresses on the BCC field rather than CC or TO field. The BCC field will hide all the destination addresses.
If you forward a message, delete the transmission history in the message body. Check this article Prevent email SPAM for more information.
Break the chain! Delete the message and do not forward it. You have now the information. Stop for a few minutes before sending the email and think.
Comment on this post with positive or negative feedback. I can take critique.

I dedicate this article to Bogdan M. who first talked me about chain letters some 10 years ago.